ancat / meatball
A host monitoring proof of concept that uses python and ebpf to watch for bad behavior and optionally take action on it.
☆11Updated 5 years ago
Alternatives and similar repositories for meatball:
Users that are interested in meatball are comparing it to the libraries listed below
- egrets monitors egress☆46Updated 4 years ago
- The noise swiss army knife☆44Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Passe Partout dumps cryptographic keys from running processes. It is useful to extract private ssh keys from ssh agent.☆26Updated 9 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆56Updated 5 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- ☆79Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Recon system hardening scanner☆47Updated 8 years ago
- New TLS Padding Oracles☆125Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- TLS Redirection☆120Updated 7 years ago
- ☆198Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- TLS - what can go wrong?☆100Updated 6 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Mignis is a semantic based tool for firewall configuration.☆42Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- Jaqen - Simple DNS rebinding☆73Updated 6 years ago